Protect Your Privacy: Why You Should Probably Make Your Own Home Automation Devices

With all of the hacks, vulnerabilities, data leaks and other disheartening news surrounding cloud services, cloud products, and big data companies, you may want to consider putting in the effort to create your own version of these solutions.

"Smart" doorbell Have you read the recent news that the "smart doorbell" sold by a major company sends your home's WiFi password in plain text through the Internet, allowing hackers to potentially gain access to your home network? And how the same company bragging about tracking "Trick-or-treaters" as they went from house-to-house on Halloween?

Have you read the news from this summer of a popular "smart lock" that allowed hackers to unlock your doors without knowing your passcode or having a key?

Figure 1 - Image: Chase Dardaman, Jason Wheeler
Figure 1 - Image: Chase Dardaman, Jason Wheeler


“Dardaman said any hub connected directly to the internet would be remotely exploitable. The researchers found five such vulnerable devices using Shodan, a search engine for publicly available devices and databases.” Have you heard that Alexa, Siri and Google Assistant can be hacked by a laser from up to 350 feet away? News of this exploitation can be found here:

These are only three examples of big data companies mishandling the privacy and security of their customers. One of the reasons these "big data products" are so often hacked is because big data companies are often less concerned about your security than they are about profits and getting a product quickly to market. In addition, they generally have sold a lot of the products in question, which makes them a juicy target for hackers.

Figure 2 - Resource List
Figure 2 - Resource List

Here are just a few benefits to building your own versions of these products:

  • You are free to exercise as much creativity and passion when developing your products as you'd like
  • You'll learn new skills and sharpen existing skills
  • You can add features that haven't been offered by others and suit your particular needs
  • You can take pride in creating your own solutions, and you can fix your own stuff
  • You can go "overboard" with your security steps, if you so desire, or you can rely on "security through obscurity,"( or a combination of the two, something which may work much better for a one-off product than a product sold to thousands or millions of customers by a big data company
  • You can take an existing how-to project found online and modify it to your personal needs and preferences, often with less effort than starting from scratch There are many open source projects that can be used as a starting point for your solution. As opposed to a "canned solution" provided by a big data company, open source software can be audited by anyone to see if any security or privacy concerns exist.

The original article can be viewed at the following link:

Be the first to comment

Leave a Reply